Author: Eli Kintisch
Publisher: Turner Publishing Company
ISBN: 047061871X
Category : Science
Languages : en
Pages : 269
Book Description
An inside tour of the incredible—and probably dangerous—plans to counteract the effects of climate change through experiments that range from the plausible to the fantastic David Battisti had arrived in Cambridge expecting a bloodbath. So had many of the other scientists who had joined him for an invitation-only workshop on climate science in 2007, with geoengineering at the top of the agenda. We can't take deliberately altering the atmosphere seriously, he thought, because there’s no way we'll ever know enough to control it. But by the second day, with bad climate news piling on bad climate news, he was having second thoughts. When the scientists voted in a straw poll on whether to support geoengineering research, Battisti, filled with fear about the future, voted in favor. While the pernicious effects of global warming are clear, efforts to reduce the carbon emissions that cause it have fallen far short of what’s needed. Some scientists have started exploring more direct and radical ways to cool the planet, such as: Pouring reflective pollution into the upper atmosphere Making clouds brighter Growing enormous blooms of algae in the ocean Schemes that were science fiction just a few years ago have become earnest plans being studied by alarmed scientists, determined to avoid a climate catastrophe. In Hack the Planet, Science magazine reporter Eli Kintisch looks more closely at this array of ideas and characters, asking if these risky schemes will work, and just how geoengineering is changing the world. Scientists are developing geoengineering techniques for worst-case scenarios. But what would those desperate times look like? Kintisch outlines four circumstances: collapsing ice sheets, megadroughts, a catastrophic methane release, and slowing of the global ocean conveyor belt. As incredible and outlandish as many of these plans may seem, could they soon become our only hope for avoiding calamity? Or will the plans of brilliant and well-intentioned scientists cause unforeseeable disasters as they play out in the real world? And does the advent of geoengineering mean that humanity has failed in its role as steward of the planet—or taken on a new responsibility? Kintisch lays out the possibilities and dangers of geoengineering in a time of planetary tipping points. His investigation is required reading as the debate over global warming shifts to whether humanity should Hack the Planet.
Hack the Planet
Author: Eli Kintisch
Publisher: Turner Publishing Company
ISBN: 047061871X
Category : Science
Languages : en
Pages : 269
Book Description
An inside tour of the incredible—and probably dangerous—plans to counteract the effects of climate change through experiments that range from the plausible to the fantastic David Battisti had arrived in Cambridge expecting a bloodbath. So had many of the other scientists who had joined him for an invitation-only workshop on climate science in 2007, with geoengineering at the top of the agenda. We can't take deliberately altering the atmosphere seriously, he thought, because there’s no way we'll ever know enough to control it. But by the second day, with bad climate news piling on bad climate news, he was having second thoughts. When the scientists voted in a straw poll on whether to support geoengineering research, Battisti, filled with fear about the future, voted in favor. While the pernicious effects of global warming are clear, efforts to reduce the carbon emissions that cause it have fallen far short of what’s needed. Some scientists have started exploring more direct and radical ways to cool the planet, such as: Pouring reflective pollution into the upper atmosphere Making clouds brighter Growing enormous blooms of algae in the ocean Schemes that were science fiction just a few years ago have become earnest plans being studied by alarmed scientists, determined to avoid a climate catastrophe. In Hack the Planet, Science magazine reporter Eli Kintisch looks more closely at this array of ideas and characters, asking if these risky schemes will work, and just how geoengineering is changing the world. Scientists are developing geoengineering techniques for worst-case scenarios. But what would those desperate times look like? Kintisch outlines four circumstances: collapsing ice sheets, megadroughts, a catastrophic methane release, and slowing of the global ocean conveyor belt. As incredible and outlandish as many of these plans may seem, could they soon become our only hope for avoiding calamity? Or will the plans of brilliant and well-intentioned scientists cause unforeseeable disasters as they play out in the real world? And does the advent of geoengineering mean that humanity has failed in its role as steward of the planet—or taken on a new responsibility? Kintisch lays out the possibilities and dangers of geoengineering in a time of planetary tipping points. His investigation is required reading as the debate over global warming shifts to whether humanity should Hack the Planet.
Publisher: Turner Publishing Company
ISBN: 047061871X
Category : Science
Languages : en
Pages : 269
Book Description
An inside tour of the incredible—and probably dangerous—plans to counteract the effects of climate change through experiments that range from the plausible to the fantastic David Battisti had arrived in Cambridge expecting a bloodbath. So had many of the other scientists who had joined him for an invitation-only workshop on climate science in 2007, with geoengineering at the top of the agenda. We can't take deliberately altering the atmosphere seriously, he thought, because there’s no way we'll ever know enough to control it. But by the second day, with bad climate news piling on bad climate news, he was having second thoughts. When the scientists voted in a straw poll on whether to support geoengineering research, Battisti, filled with fear about the future, voted in favor. While the pernicious effects of global warming are clear, efforts to reduce the carbon emissions that cause it have fallen far short of what’s needed. Some scientists have started exploring more direct and radical ways to cool the planet, such as: Pouring reflective pollution into the upper atmosphere Making clouds brighter Growing enormous blooms of algae in the ocean Schemes that were science fiction just a few years ago have become earnest plans being studied by alarmed scientists, determined to avoid a climate catastrophe. In Hack the Planet, Science magazine reporter Eli Kintisch looks more closely at this array of ideas and characters, asking if these risky schemes will work, and just how geoengineering is changing the world. Scientists are developing geoengineering techniques for worst-case scenarios. But what would those desperate times look like? Kintisch outlines four circumstances: collapsing ice sheets, megadroughts, a catastrophic methane release, and slowing of the global ocean conveyor belt. As incredible and outlandish as many of these plans may seem, could they soon become our only hope for avoiding calamity? Or will the plans of brilliant and well-intentioned scientists cause unforeseeable disasters as they play out in the real world? And does the advent of geoengineering mean that humanity has failed in its role as steward of the planet—or taken on a new responsibility? Kintisch lays out the possibilities and dangers of geoengineering in a time of planetary tipping points. His investigation is required reading as the debate over global warming shifts to whether humanity should Hack the Planet.
Hacking Planet Earth
Author: Thomas M. Kostigen
Publisher: Penguin
ISBN: 0525538356
Category : Science
Languages : en
Pages : 353
Book Description
An exploration of the cutting-edge technology that will enable us to confront the realities of climate change. For decades scientists and environmentalists have sounded the alarm about the effects of global warming. We are now past the tipping point. As floods, storms, and extreme temperatures become our daily reality, "Reduce, Reuse, Recycle" efforts aren't enough anymore. In Hacking Planet Earth, New York Times bestselling author Thomas Kostigen takes readers to the frontlines of geoengineering projects that scientists, entrepreneurs, engineers, and other visionaries around the world are developing to solve the problems associated with climate change. From giant parasols hovering above the Earth to shield us from an unforgiving sun, to lasers shooting up into clouds to coax out much-needed water, Kostigen introduces readers to this inspiring work and the people who are spearheading it. These futurist, far- thinking, world-changing ideas will save us, and Hacking Planet Earth offers readers their new vision for the future.
Publisher: Penguin
ISBN: 0525538356
Category : Science
Languages : en
Pages : 353
Book Description
An exploration of the cutting-edge technology that will enable us to confront the realities of climate change. For decades scientists and environmentalists have sounded the alarm about the effects of global warming. We are now past the tipping point. As floods, storms, and extreme temperatures become our daily reality, "Reduce, Reuse, Recycle" efforts aren't enough anymore. In Hacking Planet Earth, New York Times bestselling author Thomas Kostigen takes readers to the frontlines of geoengineering projects that scientists, entrepreneurs, engineers, and other visionaries around the world are developing to solve the problems associated with climate change. From giant parasols hovering above the Earth to shield us from an unforgiving sun, to lasers shooting up into clouds to coax out much-needed water, Kostigen introduces readers to this inspiring work and the people who are spearheading it. These futurist, far- thinking, world-changing ideas will save us, and Hacking Planet Earth offers readers their new vision for the future.
How to Hack Like a God: Master the Secrets of Hacking Through Real Life Scenarios
Author: Sparc Flow
Publisher: Hack the Planet
ISBN: 9781521232682
Category : Computers
Languages : en
Pages : 122
Book Description
Follow me on a step-by-step hacking journey where we pwn a high-profile fashion company. From zero initial access to remotely recording board meetings, we will detail every custom script and technique used in this attack, drawn from real-life findings, to paint the most realistic picture possible. Whether you are a wannabe pentester dreaming about real-life hacking experiences or an experienced ethical hacker tired of countless Metasploit tutorials, you will find unique gems in this book for you to try: -Playing with Kerberos -Bypassing Citrix & Applocker -Mainframe hacking -Fileless WMI persistence -NoSQL injections -Wiegand protocol -Exfiltration techniques -Antivirus evasion tricks -And much more advanced hacking techniques I have documented almost every tool and custom script used in this book. I strongly encourage you to test them out yourself and master their capabilities (and limitations) in an environment you own and control. Hack (safely) the Planet! (Previously published as How to Hack a Fashion Brand)
Publisher: Hack the Planet
ISBN: 9781521232682
Category : Computers
Languages : en
Pages : 122
Book Description
Follow me on a step-by-step hacking journey where we pwn a high-profile fashion company. From zero initial access to remotely recording board meetings, we will detail every custom script and technique used in this attack, drawn from real-life findings, to paint the most realistic picture possible. Whether you are a wannabe pentester dreaming about real-life hacking experiences or an experienced ethical hacker tired of countless Metasploit tutorials, you will find unique gems in this book for you to try: -Playing with Kerberos -Bypassing Citrix & Applocker -Mainframe hacking -Fileless WMI persistence -NoSQL injections -Wiegand protocol -Exfiltration techniques -Antivirus evasion tricks -And much more advanced hacking techniques I have documented almost every tool and custom script used in this book. I strongly encourage you to test them out yourself and master their capabilities (and limitations) in an environment you own and control. Hack (safely) the Planet! (Previously published as How to Hack a Fashion Brand)
How to Hack Like a Ghost
Author: Sparc Flow
Publisher: No Starch Press
ISBN: 1718501277
Category : Computers
Languages : en
Pages : 241
Book Description
How to Hack Like a Ghost takes you deep inside the mind of a hacker as you carry out a fictionalized attack against a tech company, teaching cutting-edge hacking techniques along the way. Go deep into the mind of a master hacker as he breaks into a hostile, cloud-based security environment. Sparc Flow invites you to shadow him every step of the way, from recon to infiltration, as you hack a shady, data-driven political consulting firm. While the target is fictional, the corporation’s vulnerabilities are based on real-life weaknesses in today’s advanced cybersecurity defense systems. You’ll experience all the thrills, frustrations, dead-ends, and eureka moments of his mission first-hand, while picking up practical, cutting-edge techniques for penetrating cloud technologies. There are no do-overs for hackers, so your training starts with basic OpSec procedures, using an ephemeral OS, Tor, bouncing servers, and detailed code to build an anonymous, replaceable hacking infrastructure guaranteed to avoid detection. From there, you’ll examine some effective recon techniques, develop tools from scratch, and deconstruct low-level features in common systems to gain access to the target. Spark Flow’s clever insights, witty reasoning, and stealth maneuvers teach you how to think on your toes and adapt his skills to your own hacking tasks. You'll learn: How to set up and use an array of disposable machines that can renew in a matter of seconds to change your internet footprint How to do effective recon, like harvesting hidden domains and taking advantage of DevOps automation systems to trawl for credentials How to look inside and gain access to AWS’s storage systems How cloud security systems like Kubernetes work, and how to hack them Dynamic techniques for escalating privileges Packed with interesting tricks, ingenious tips, and links to external resources, this fast-paced, hands-on guide to penetrating modern cloud systems will help hackers of all stripes succeed on their next adventure.
Publisher: No Starch Press
ISBN: 1718501277
Category : Computers
Languages : en
Pages : 241
Book Description
How to Hack Like a Ghost takes you deep inside the mind of a hacker as you carry out a fictionalized attack against a tech company, teaching cutting-edge hacking techniques along the way. Go deep into the mind of a master hacker as he breaks into a hostile, cloud-based security environment. Sparc Flow invites you to shadow him every step of the way, from recon to infiltration, as you hack a shady, data-driven political consulting firm. While the target is fictional, the corporation’s vulnerabilities are based on real-life weaknesses in today’s advanced cybersecurity defense systems. You’ll experience all the thrills, frustrations, dead-ends, and eureka moments of his mission first-hand, while picking up practical, cutting-edge techniques for penetrating cloud technologies. There are no do-overs for hackers, so your training starts with basic OpSec procedures, using an ephemeral OS, Tor, bouncing servers, and detailed code to build an anonymous, replaceable hacking infrastructure guaranteed to avoid detection. From there, you’ll examine some effective recon techniques, develop tools from scratch, and deconstruct low-level features in common systems to gain access to the target. Spark Flow’s clever insights, witty reasoning, and stealth maneuvers teach you how to think on your toes and adapt his skills to your own hacking tasks. You'll learn: How to set up and use an array of disposable machines that can renew in a matter of seconds to change your internet footprint How to do effective recon, like harvesting hidden domains and taking advantage of DevOps automation systems to trawl for credentials How to look inside and gain access to AWS’s storage systems How cloud security systems like Kubernetes work, and how to hack them Dynamic techniques for escalating privileges Packed with interesting tricks, ingenious tips, and links to external resources, this fast-paced, hands-on guide to penetrating modern cloud systems will help hackers of all stripes succeed on their next adventure.
Hacking Innovation
Author: Josh Linkner
Publisher: Fastpencil Publishing
ISBN: 9781499902297
Category : Business & Economics
Languages : en
Pages :
Book Description
Hackers are a global fascination with cybercrime representing our single biggest threat to national security. But putting their sinister motives aside, the dark underworld of hackers contains some of the most creative minds on the planet.
Publisher: Fastpencil Publishing
ISBN: 9781499902297
Category : Business & Economics
Languages : en
Pages :
Book Description
Hackers are a global fascination with cybercrime representing our single biggest threat to national security. But putting their sinister motives aside, the dark underworld of hackers contains some of the most creative minds on the planet.
How to Hack Like a Legend
Author: Sparc Flow
Publisher: No Starch Press
ISBN: 1718501501
Category : Computers
Languages : en
Pages : 217
Book Description
Tag along with a master hacker on a truly memorable attack. From reconnaissance to infiltration, you’ll experience their every thought, frustration, and strategic decision-making first-hand in this exhilarating narrative journey into a highly defended Windows environment driven by AI. Step into the shoes of a master hacker and break into an intelligent, highly defensive Windows environment. You’ll be infiltrating the suspicious (fictional) offshoring company G & S Trust and their hostile Microsoft stronghold. While the target is fictional, the corporation’s vulnerabilities are based on real-life weaknesses in today’s advanced Windows defense systems. You’ll experience all the thrills, frustrations, dead-ends, and eureka moments of the mission first-hand, while picking up practical, cutting-edge techniques for evading Microsoft’s best security systems. The adventure starts with setting up your elite hacking infrastructure complete with virtual Windows system. After some thorough passive recon, you’ll craft a sophisticated phishing campaign to steal credentials and gain initial access. Once inside you’ll identify the security systems, scrape passwords, plant persistent backdoors, and delve deep into areas you don’t belong. Throughout your task you’ll get caught, change tack on a tee, dance around defensive monitoring systems, anddisable tools from the inside. Sparc Flow’s clever insights, witty reasoning, andstealth maneuvers teach you to be patient, persevere, and adapt your skills at the drop of a hat. You’ll learn how to: Identify and evade Microsoft security systems like Advanced Threat Analysis,QRadar, MDE, and AMSI Seek out subdomains and open ports with Censys, Python scripts, and other OSINT tools Scrape password hashes using Kerberoasting Plant camouflaged C# backdoors and payloads Grab victims’ credentials with more advanced techniques like reflection anddomain replication Like other titles in the How to Hack series, this book is packed with interesting tricks, ingenious tips, and links to useful resources to give you a fast-paced, hands-on guide to penetrating and bypassing Microsoft security systems.
Publisher: No Starch Press
ISBN: 1718501501
Category : Computers
Languages : en
Pages : 217
Book Description
Tag along with a master hacker on a truly memorable attack. From reconnaissance to infiltration, you’ll experience their every thought, frustration, and strategic decision-making first-hand in this exhilarating narrative journey into a highly defended Windows environment driven by AI. Step into the shoes of a master hacker and break into an intelligent, highly defensive Windows environment. You’ll be infiltrating the suspicious (fictional) offshoring company G & S Trust and their hostile Microsoft stronghold. While the target is fictional, the corporation’s vulnerabilities are based on real-life weaknesses in today’s advanced Windows defense systems. You’ll experience all the thrills, frustrations, dead-ends, and eureka moments of the mission first-hand, while picking up practical, cutting-edge techniques for evading Microsoft’s best security systems. The adventure starts with setting up your elite hacking infrastructure complete with virtual Windows system. After some thorough passive recon, you’ll craft a sophisticated phishing campaign to steal credentials and gain initial access. Once inside you’ll identify the security systems, scrape passwords, plant persistent backdoors, and delve deep into areas you don’t belong. Throughout your task you’ll get caught, change tack on a tee, dance around defensive monitoring systems, anddisable tools from the inside. Sparc Flow’s clever insights, witty reasoning, andstealth maneuvers teach you to be patient, persevere, and adapt your skills at the drop of a hat. You’ll learn how to: Identify and evade Microsoft security systems like Advanced Threat Analysis,QRadar, MDE, and AMSI Seek out subdomains and open ports with Censys, Python scripts, and other OSINT tools Scrape password hashes using Kerberoasting Plant camouflaged C# backdoors and payloads Grab victims’ credentials with more advanced techniques like reflection anddomain replication Like other titles in the How to Hack series, this book is packed with interesting tricks, ingenious tips, and links to useful resources to give you a fast-paced, hands-on guide to penetrating and bypassing Microsoft security systems.
The Hacked World Order
Author: Adam Segal
Publisher: PublicAffairs
ISBN: 161039416X
Category : Political Science
Languages : en
Pages : 322
Book Description
For more than three hundred years, the world wrestled with conflicts that arose between nation-states. Nation-states wielded military force, financial pressure, and diplomatic persuasion to create "world order." Even after the end of the Cold War, the elements comprising world order remained essentially unchanged. But 2012 marked a transformation in geopolitics and the tactics of both the established powers and smaller entities looking to challenge the international community. That year, the US government revealed its involvement in Operation "Olympic Games," a mission aimed at disrupting the Iranian nuclear program through cyberattacks; Russia and China conducted massive cyber-espionage operations; and the world split over the governance of the Internet. Cyberspace became a battlefield. Cyber conflict is hard to track, often delivered by proxies, and has outcomes that are hard to gauge. It demands that the rules of engagement be completely reworked and all the old niceties of diplomacy be recast. Many of the critical resources of statecraft are now in the hands of the private sector, giant technology companies in particular. In this new world order, cybersecurity expert Adam Segal reveals, power has been well and truly hacked.
Publisher: PublicAffairs
ISBN: 161039416X
Category : Political Science
Languages : en
Pages : 322
Book Description
For more than three hundred years, the world wrestled with conflicts that arose between nation-states. Nation-states wielded military force, financial pressure, and diplomatic persuasion to create "world order." Even after the end of the Cold War, the elements comprising world order remained essentially unchanged. But 2012 marked a transformation in geopolitics and the tactics of both the established powers and smaller entities looking to challenge the international community. That year, the US government revealed its involvement in Operation "Olympic Games," a mission aimed at disrupting the Iranian nuclear program through cyberattacks; Russia and China conducted massive cyber-espionage operations; and the world split over the governance of the Internet. Cyberspace became a battlefield. Cyber conflict is hard to track, often delivered by proxies, and has outcomes that are hard to gauge. It demands that the rules of engagement be completely reworked and all the old niceties of diplomacy be recast. Many of the critical resources of statecraft are now in the hands of the private sector, giant technology companies in particular. In this new world order, cybersecurity expert Adam Segal reveals, power has been well and truly hacked.
How to Investigate Like a Rockstar
Author: Sparc Flow
Publisher: Hacking the Planet
ISBN: 9781549527623
Category : Computers
Languages : en
Pages : 118
Book Description
"There are two kinds of companies: those that have been breached and those that do not know it yet." The company calling us just discovered an anomaly on their most critical systems. Our job is to conduct a deep forensic analysis, perform threat assessment, and uncover all malware programs left by hackers. Digital Forensics We follow the attacker's footprint across a variety of systems and create an infection timeline to help us understand their motives. We go as deep as memory analysis, perfect disk copy, threat hunting and malware analysis while sharing insights into real crisis management. Rebuilding systems Finally, we tackle the most important issues of any security incident response: how to kick the attackers out of the systems and regain trust in machines that have been breached. For those that read hacking books like the "Art of Exploitation" or "How to Hack Like a Pornstar," you finally get to experience what it feels like to be on the other side of the Firewall!
Publisher: Hacking the Planet
ISBN: 9781549527623
Category : Computers
Languages : en
Pages : 118
Book Description
"There are two kinds of companies: those that have been breached and those that do not know it yet." The company calling us just discovered an anomaly on their most critical systems. Our job is to conduct a deep forensic analysis, perform threat assessment, and uncover all malware programs left by hackers. Digital Forensics We follow the attacker's footprint across a variety of systems and create an infection timeline to help us understand their motives. We go as deep as memory analysis, perfect disk copy, threat hunting and malware analysis while sharing insights into real crisis management. Rebuilding systems Finally, we tackle the most important issues of any security incident response: how to kick the attackers out of the systems and regain trust in machines that have been breached. For those that read hacking books like the "Art of Exploitation" or "How to Hack Like a Pornstar," you finally get to experience what it feels like to be on the other side of the Firewall!
Hacking the Planet with Notcurses
Author: Nick Black
Publisher:
ISBN:
Category :
Languages : en
Pages : 160
Book Description
Nick Black, prolific Free Software developer and designer of Notcurses, introduces character graphics and Text User Interface design. The examples use the modern Notcurses library, but many of the lessons are applicable to TUI programming using NCURSES or Newt. Topics include the history of and current practice of terminals, Unicode (through 2020's Unicode 13.0), handling input from keyboards and mice, effective use of RGB DirectColor, palette-indexed pseudocolor, and alpha blending, loading images and video, construction of reusable TUI widgets, and more. These concepts are developed using rich examples. Nick graduated with a handful of degrees from the Georgia Institute of Technology, and has hacked away in the code mines of NVIDIA, Google, and several successful startups. He is a Senior Member of the ACM, and a consulting scientist at Dirty South Supercomputing and Waffles.
Publisher:
ISBN:
Category :
Languages : en
Pages : 160
Book Description
Nick Black, prolific Free Software developer and designer of Notcurses, introduces character graphics and Text User Interface design. The examples use the modern Notcurses library, but many of the lessons are applicable to TUI programming using NCURSES or Newt. Topics include the history of and current practice of terminals, Unicode (through 2020's Unicode 13.0), handling input from keyboards and mice, effective use of RGB DirectColor, palette-indexed pseudocolor, and alpha blending, loading images and video, construction of reusable TUI widgets, and more. These concepts are developed using rich examples. Nick graduated with a handful of degrees from the Georgia Institute of Technology, and has hacked away in the code mines of NVIDIA, Google, and several successful startups. He is a Senior Member of the ACM, and a consulting scientist at Dirty South Supercomputing and Waffles.
Sandworm
Author: Andy Greenberg
Publisher: Anchor
ISBN: 0525564632
Category : Computers
Languages : en
Pages : 370
Book Description
"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy The true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it: "[A] chilling account of a Kremlin-led cyberattack, a new front in global conflict" (Financial Times). In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen. The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike. A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur—with world-shaking implications.
Publisher: Anchor
ISBN: 0525564632
Category : Computers
Languages : en
Pages : 370
Book Description
"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy The true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it: "[A] chilling account of a Kremlin-led cyberattack, a new front in global conflict" (Financial Times). In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen. The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike. A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur—with world-shaking implications.